MGASA-2024-0026

Source
https://advisories.mageia.org/MGASA-2024-0026.html
Import Source
https://advisories.mageia.org/MGASA-2024-0026.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0026
Related
Published
2024-02-04T02:49:27Z
Modified
2024-02-04T01:34:41Z
Summary
Updated glibc packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities: A heap-based buffer overflow was found in the _vsysloginternal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. (CVE-2023-6246) An off-by-one heap-based buffer overflow was found in the _vsysloginternal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INTMAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. (CVE-2023-6779) An integer overflow was found in the _vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. (CVE-2023-6780)

References
Credits

Affected packages

Mageia:9 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.36-52.mga9

Ecosystem specific

{
    "section": "core"
}